New Malware Murofet Following Conficker's Lead

Description

It’s been a blissful few months since Conficker last reared its over-hyped head, but now there’s a new piece of malware that is adopting some of the tactics that Conficker used. The malware, known as Murofet, is using Conficker’s technique of generating thousands of new domains for updates every day, but doing it in a somewhat novel way.

Murofet is rather new on the malware scene, but some of the tactics that it’s using are by no means innovative. The main similarity between Conficker and Murofet is that both pieces of malware use a pre-determined algorithm to generate seemingly random domain names each day and attempt to contact those domains for new updates. But that’s essentially where the similarities end.

Immediately upon executing, Murofet starts a thread that attempts to download malware updates. It generates pseudo-random domain names based on the year, month, day, and minute of execution. The algorithm used for domain generation is simple, using the previously mentioned data, it generates two DWORD values. The first is composed of the month, day, and low byte of the year of the date of execution, plus 0x30 (48). The second DWORD value is based on the minute of execution, multiplied by 0x11 (17). This number is hereafter iterated 800 times to generate multiple domains. The resulting QWORD value is then hashed with the MD5 algorithm and each byte of the result is then used to generate one letter of the domain name by dividing it into 2 nibbles and, if a valid numeric representation of a letter of the alphabet, converted into that letter by adding 0x61 (‘a’). For example, 0x42 = 0x4 + 0x2 = 0x6 = ‘g’ (zero represents ‘a’). Each letter is then concatenated into a domain name.

That’s a lot of hoops to jump through in order to generate a domain name, but it may be a result of the amount of effort that researchers and law enforcement officials have been putting into finding and removing command-and-control servers and domains that are used to run phishing and malware operations. As a result of concentrated takedown operations run in tandem by law enforcement and technology companies, a number of high profile botnets and malware operations have been severely damaged or killed altogether.

The most prominent example of this is, in fact, the Conficker Working Group, a group of dozens of technology vendors who banded together and worked on technical and legal techniques for hemming in Conficker last year. The group was successful in identifying and sinkholing many of the domains that Conficker used to download updates and new components.

This atmosphere has made it somewhat more difficult for attackers to maintain persistent domains that they can use as update servers or C&C mechanisms, hence the lengths to which Murofet’s creators have gone to generate 1,020 new random domains every day.

All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to content@vulners.com Vulners, 2018

Protected by

{"id": "THREATPOST:F9182210349ACDAF911220C5BFC6A47B", "hash": "a428296fc2303420bffc94ad634b6ca9", "type": "threatpost", "bulletinFamily": "info", "title": "New Malware Murofet Following Conficker's Lead", "description": "[![](https://media.threatpost.com/wp-content/uploads/sites/103/2013/04/07060140/murofet1.jpg)](<https://threatpost.com/new-malware-murofet-following-confickers-lead-101510/>)It\u2019s been a blissful few months since Conficker last reared its over-hyped head, but now there\u2019s a new piece of malware that is adopting some of the tactics that Conficker used. The malware, known as Murofet, is using Conficker\u2019s technique of generating thousands of new domains for updates every day, but doing it in a somewhat novel way.\n\nMurofet is rather new on the malware scene, but some of the tactics that it\u2019s using are by no means innovative. The main similarity between Conficker and Murofet is that both pieces of malware use a pre-determined algorithm to generate seemingly random domain names each day and attempt to contact those domains for new updates. But that\u2019s essentially where the similarities end.\n\nThe system that Murofet uses to generate the new domain names each day is quite interesting and requires more than a few steps, according to an [analysis of Murofet by researchers at Websense](<http://community.websense.com/blogs/securitylabs/archive/2010/10/14/murofet-domain-generation-ala-conficker.aspx>). \n\nImmediately upon executing, Murofet starts a thread that attempts to download malware updates. It generates pseudo-random domain names based on the year, month, day, and minute of execution. The algorithm used for domain generation is simple, using the previously mentioned data, it generates two DWORD values. The first is composed of the month, day, and low byte of the year of the date of execution, plus 0x30 (48). The second DWORD value is based on the minute of execution, multiplied by 0x11 (17). This number is hereafter iterated 800 times to generate multiple domains. The resulting QWORD value is then hashed with the MD5 algorithm and each byte of the result is then used to generate one letter of the domain name by dividing it into 2 nibbles and, if a valid numeric representation of a letter of the alphabet, converted into that letter by adding 0x61 (\u2018a\u2019). For example, 0x42 = 0x4 + 0x2 = 0x6 = \u2018g\u2019 (zero represents \u2018a\u2019). Each letter is then concatenated into a domain name. \n\nThat\u2019s a lot of hoops to jump through in order to generate a domain name, but it may be a result of the amount of effort that researchers and law enforcement officials have been putting into finding and removing command-and-control servers and domains that are used to run phishing and malware operations. As a result of concentrated takedown operations run in tandem by law enforcement and technology companies, a number of high profile botnets and malware operations have been severely damaged or killed altogether.\n\nThe most prominent example of this is, in fact, the [Conficker Working Group](<http://www.confickerworkinggroup.org/wiki/>), a group of dozens of technology vendors who banded together and worked on technical and legal techniques for hemming in Conficker last year. The group was successful in identifying and sinkholing many of the domains that Conficker used to download updates and new components. \n\nThis atmosphere has made it somewhat more difficult for attackers to maintain persistent domains that they can use as update servers or C&amp;C mechanisms, hence the lengths to which Murofet\u2019s creators have gone to generate 1,020 new random domains every day. \n", "published": "2010-10-15T15:09:49", "modified": "2018-08-15T10:19:59", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/new-malware-murofet-following-confickers-lead-101510/74577/", "reporter": "Dennis Fisher", "references": ["https://threatpost.com/new-malware-murofet-following-confickers-lead-101510/", "http://community.websense.com/blogs/securitylabs/archive/2010/10/14/murofet-domain-generation-ala-conficker.aspx", "http://www.confickerworkinggroup.org/wiki/"], "cvelist": [], "lastseen": "2018-10-06T23:06:48", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2018-10-06T23:06:48"}, "dependencies": {"references": [], "modified": "2018-10-06T23:06:48"}, "vulnersScore": 5.0}, "objectVersion": "1.4", "_object_type": "robots.models.threatpost.ThreatpostBulletin", "_object_types": ["robots.models.base.Bulletin", "robots.models.threatpost.ThreatpostBulletin"]}